CN100407616C - Method for automatic ally updating network system pins - Google Patents

Method for automatic ally updating network system pins Download PDF

Info

Publication number
CN100407616C
CN100407616C CN021193312A CN02119331A CN100407616C CN 100407616 C CN100407616 C CN 100407616C CN 021193312 A CN021193312 A CN 021193312A CN 02119331 A CN02119331 A CN 02119331A CN 100407616 C CN100407616 C CN 100407616C
Authority
CN
China
Prior art keywords
data
pins
terminating machine
control station
network system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN021193312A
Other languages
Chinese (zh)
Other versions
CN1457168A (en
Inventor
陈坤辉
张汝南
李文标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Appliances Corp
Original Assignee
Inventec Appliances Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Corp filed Critical Inventec Appliances Corp
Priority to CN021193312A priority Critical patent/CN100407616C/en
Publication of CN1457168A publication Critical patent/CN1457168A/en
Application granted granted Critical
Publication of CN100407616C publication Critical patent/CN100407616C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a method for automatically updating a network system key code. The network system comprises a server, a control station, a terminal machine and a timing die set, wherein the control station is connected to the server; the terminal machine is connected to the control station; the timing die set is used for recording time. The control station and the terminal machine comprise first key codes for encrypting and decrypting transmitted data. The method comprises: triggering the timing die set to start to record the time; generating second key codes in a random mode when the time recorded by the timing die set conforms to subscribed time; transmitting the second key codes to the terminal machine and updating the first key codes in the terminal machine into the second key codes.

Description

A kind of method of automatic ally updating network system pins
Technical field
The present invention relates to a kind of method of upgrading no net network system pins, relate in particular to a kind of can be automatically and dynamically update the method for Radio Network System pins.
Background technology
Prosperity day by day along with network technology, the user can conveniently reach and see through the transmission interchange that network system is made data fast, and do not need as traditional mode must be earlier data storing in rigid magnetic disc or soft magnetic disc, and then be carried on the device that will store and stored.Utilize network system that data are transmitted fast, and the corrupted data that is taken place can avoid carrying data with rigid or soft magnetic disc the time.Especially now the development of radio network technique more allows the user can not be subjected to the restriction of grid line, and can carry out the transmission of data anywhere or anytime.
Though utilize wireless network transmissions can reach the purpose of convenient and quick Data transmission, and can transmit data whenever and wherever possible, the confidentiality that is transmitted data is tested.The data of utilizing wireless network transmissions are transmitted in the mode of radio wave, because data exposed in the air, therefore is easy to be stolen by the third party in the way of transmission.In order to prevent that data from being stolen in the way of transmission, so data must carry out suitable encryption acts with wireless network transmissions the time, so that data can be transmitted safely.
Please refer to Fig. 1, Fig. 1 is the configuration diagram of known wireless network system 10.Radio Network System 10 includes a server 12, at least one control station 14 and a plurality of terminating machine T1, T2 and T3.Each terminating machine T1, T2 and T3 all can transmit data to control station 14 by wireless mode, and reception control station 14 is with the data of wireless mode emission, similarly, control station 14 can also transfer data to each terminating machine T1 by wireless mode, T2 and T3, and receiving terminal machine T1, T2 and T3 are with the data of wireless mode emission, and the transmission of its data all meets the regulation (as the agreement of 802.11 wireless networks) of a network convention (protocol).Can wired or wireless mode connect between control station 14 and the server 12, therefore equally also can wired or wireless mode between control station 14 and the server 12 do the transmission of data, in the present embodiment, suppose between control station 14 and the server 12 it is the transmission of making data in wired mode.And each terminating machine T1, the transmission and the exchange of data carried out in the service that also can utilize control station 14 and server 12 to provide between T2 and the T3; Suppose that terminating machine T1 tendency to develop transmission of data is to terminating machine T2, terminating machine T1 can transfer to control station 14 with data earlier wirelessly so, again by control station 14 with transfer of data to terminating machine T2, so, the data of terminating machine T1 just can successfully see through control station 14 and transfer to terminating machine T2.Similarly, terminating machine T1 also can see through control station 14 with transfer of data to terminating machine T3, other are as the same.
Though server 12, control station 14 and terminating machine T1 in the Radio Network System 10, all can make things convenient for and carry out fast the transmission and the exchange of data between T2 and the T3, because data are with the Wireless transmission mode transmission, data are easy to be stolen by the third party in the way of transmitting, therefore data must be encrypted (encrypt) processing when transmitting, to prevent stealing of the third party.For the processing that will encrypt data, so the devices in the Radio Network System 10 all store identical pins (key) K, so that the data that are transmitted are encrypted and deciphered.Device in the same Radio Network System can have identical pins, control station 14 and each terminating machine T1 in the Radio Network System 10 as shown in Figure 1, T2 and T3 all store an identical pins K, and data are carried out encryption and decryption according to pins K, so data just can transmission Radio Network System 10 in safely.The transport process of data can be described below.When terminating machine T1 tendency to develop transmission of data to control station 14, terminating machine T1 can encrypt the defeated data of tendency to develop with pins K earlier so, and then data encrypted is sent to control station 14 wirelessly.After control station 14 receives the enciphered data that sends from terminating machine T1, can be decrypted ciphered data, transport to the authentic data of control station 14 to obtain terminating machine T tendency to develop with identical pins K.Similarly, when control station 14 tendency to develop transmission of data to terminating machine T1, control station 14 also can be encrypted data with pins K, and then data are sent to terminating machine T1, further to be decrypted and to obtain data.So, what data just can be suitable in the process that transmits is maintained secrecy, to avoid stealing of the third party.
In addition, each the terminating machine T1 in the Radio Network System 10, T2 and T3 all include other recognition data D1, a D2 and D3, include recognition data D1 as terminating machine T1, and terminating machine T2 and T3 then include recognition data D2 and D3 respectively.Recognition data D1 includes data such as user identification code ID1, user cipher PW1 and terminating machine address Add1, and recognition data D2 and D3 are as the same.In addition, also have in the server 12 and recognition data D1, D2 and the corresponding logon data D of D3, store each terminating machine T1 in the logon data D, the data of T2 and T3.Terminating machine T1, T2 and T3 can utilize recognition data D1, D2 and D3 to login in the Radio Network System 10, and server can utilize logon data D to confirm terminating machine T1, the identity of T2 and T3, with each terminating machine T1 of further control, the access of T2 and T3 is as access right control and access address control etc.
As previously mentioned, terminating machine in the same Radio Network System and the shared identical pins of control station meeting, and in known network managing mode, this pins K will input to each terminating machine T1 in manual mode (as utilizing the keyboard input) one by one by the network work personnel, in T2 and T3 and the control station 14.Thus, except the staff, the user of each terminating machine can't know the content of this pins K, is leaked to avoid pins K, further protects the data content that is transmitted.Yet, if any one terminating machine T1 in the Radio Network System 10, T2 and T3 will withdraw from this Radio Network System 10, (for instance, Radio Network System 10 is a paying network, and the user of terminating machine no longer pays and withdraw from the service that the paying network provides), so because this terminating machine T1, still store the pins K identical in T2 and the T3 with Radio Network System 10, so terminating machine T1, T2 and T3 still can pins K access wireless network system data in 10, so the data in the Radio Network System 10 will be leaked.Therefore, in known technology, for the data that will make transmission in the Radio Network System 10 can be certain maintained secrecy, the staff just must be in any one terminating machine T1, after T2 and T3 withdraw from Radio Network System 10, again in manual mode one by one to the terminating machine T1 in the Radio Network System 10, the pins that 14 inputs one of T2 and T3 and control station are new can not leaked with the data of guaranteeing transmission in the Radio Network System 10.Because whenever terminating machine T1 is arranged, T2 and T3 will withdraw from Radio Network System 10, the staff just the pins that more renews one by one, so with spended time and manpower.And owing to be responsible for to change the content that the staff of pins K knows pins K, so pins K also might be leaked, and what it was inreal is maintained secrecy.
Summary of the invention
Therefore, but main purpose of the present invention is to provide a kind of self-timing to upgrade the method for the pins of a Radio Network System, makes the Radio Network System can be automatically and upgrade shared pins in it dynamically, to guarantee the confidentiality of pins and transmission data.
The invention provides a kind of method of automatic ally updating network system pins, this network system includes:
One server;
One control station is connected in this server, is used for the data that this server transmits are sent wirelessly, or receives wireless data and data are sent to this server; Wherein this control station is encrypted the data that will transfer to this terminating machine with first pins;
One terminating machine is used for receiving the data that this control station transmits with wireless mode, and with wireless mode data is sent to this control station; Store this first pins in this terminating machine, be used for encrypting the data that will transfer to this control station; And
One timing module is installed in this server, this control station or this terminating machine, is used for writing time;
This terminating machine has a recognition data in addition, and stores a pair of logon data that should recognition data in this server in addition;
This method includes:
Trigger this timing module opening entry time;
When the time of this timing module record meets a ticket reserving time, produce second pins at random mode;
This control station is interrogated data with one and is transferred to this terminating machine wirelessly;
It is a response data that first pins in this terminating machine should be interrogated data encryption, and this response data is transferred to this control station wirelessly;
This control station is compared this response data and a standard response data;
If this response data meets this standard response data, then this terminating machine transfers to this control station wirelessly with the recognition data of this terminating machine;
This control station transfers to this server with this recognition data;
If the recognition data of this terminating machine meets the logon data of this server, then this control station can transfer to this terminating machine with this second pins, is updated to this second pins with first pins that will store in this terminating machine; And
This second pins is encrypted the data of transmitting mutually between this control station and this terminating machine.
Description of drawings
Fig. 1 is the configuration diagram of known wireless network system.
Fig. 2 is the configuration diagram of Radio Network System of the present invention.
Fig. 3 upgrades the flow chart of the pins of Radio Network System automatically for the present invention.
Embodiment
Please refer to Fig. 2, Fig. 2 is the configuration diagram of Radio Network System 30 of the present invention.Radio Network System 30 of the present invention includes a server 32, at least one control station 34 and a plurality of terminating machine P1, P2 and P3, all stores first an identical pins K1 in control station 34 and terminating machine P1, P2 and the P3.All include other recognition data I1, an I2 and I3 in each terminating machine P1, P2 and the P3, then include in the server 32 and recognition data I1, I2 and the corresponding logon data I of I3, with the access of control terminal machine P1, P2 and P3.Radio Network System 30 of the present invention and known wireless network system 10 differences are that the server 32 of Radio Network System 30 of the present invention includes a timing module 36 in addition, and control station 34 then includes a random code generating routine 38 in addition.Timing module 36 is used for calculating an actual time (Real Time), the time of being calculated when timing module 36 meets a scheduled time, timing module 36 just can send a signal to control station 34 so, produce second a new pins K2 to touch random code generating routine 38, then server 32 just can control terminal machine P1, P2 and P3 and control station 34 so that the first pins K1 is updated to the second pins K2, the narration as for method for updating below visible.
Please refer to Fig. 3, Fig. 3 upgrades the flow chart of the pins of Radio Network System 30 automatically for the present invention.The present invention upgrades the step following (is example with terminating machine P1) of the pins of Radio Network System 30 automatically:
Step 100: the timing module 36 in the starting server 32 is started the clock timing module 36.
Step 105: if timing module 36 time of being calculated meets a preset time, timing module 36 just can send a signal to control station 34 so, produces the second pins K2 with the random code generating routine 38 that touches in the control station 34 at random mode.
Step 110: after random code generating routine 38 produced the second pins K2, control station 34 can be interrogated data (challenge text) with one and be transferred to terminating machine P1 wirelessly, and purpose is for confirming whether terminating machine P1 has the first pins K1.Owing to do not determine whether terminating machine P1 has the first pins K1 this moment yet, so the interrogation data of the control station 34 terminating machine P1 that transfers to are not encrypted with the first pins K1.
Step 120: after terminating machine P1 received and interrogates data, just can will interrogate data encryption with the first pins K1 in it was a response data, then response data is transmitted back to control station 34.
Step 130: it is a standard response data that control station 34 also can will be interrogated data encryption with first pins, when control station 34 receives after the response data of terminating machine P1 transmission, control station 34 just can compare response data and standard response data, if response data is identical with the standard response data, represent that so terminating machine P1 stores the first pins K1, and proceed step 140; But if response data is different with the standard response data, represents that so terminating machine P1 does not store the first pins K1, and do not belong to Radio Network System 30, therefore carry out step 135, promptly stop terminating machine P1 is upgraded pins.
Step 140: require terminating machine P1 to transmit recognition data, purpose is for confirming whether terminating machine P1 belongs to Radio Network System 30; Because determined that terminating machine P1 stores the first pins K1 this moment, so from then on step begins, the transfer of data between terminating machine P1 and the control station 34 can further be encrypted with the first pins K1, so that the data of being transmitted are maintained secrecy.
Step 150: after the requirement of reception control station 34 transmitted the message of recognition data, terminating machine P1 just can encrypt its recognition data with the first pins K1, and then is sent to control station 34.
Step 160: control station 34 receives the recognition data that transmits from terminating machine P1, and is decrypted with the first pins K1, then the recognition data after the deciphering is sent to server 32.
Step 170: after server 32 receives the recognition data that sends from control station 34, just can do one to recognition data I1 and the logon data I in it relatively, if recognition data I1 meets logon data I, so just can confirm further that terminating machine P1 belongs to Radio Network System 30, proceeds step 180; Otherwise represent that just terminating machine P1 does not belong to Radio Network System 30, stop to upgrade pins for terminating machine P1.
Step 180: after server 32 confirmed that terminating machine P1 belong to Radio Network System 30, control station 34 just can send a message and whether agree the pins that more renews to terminating machine P1 with the user of inquiry terminal machine P1.
Step 190: after the user of terminating machine P1 receives the inquiry notice of sending from control station 34, just can send the message of agreement and give control station 34.
Step 200: after receiving the agree to notify that sends from terminating machine P1 when control station 34, control station 34 just can be encrypted the second pins K2 with the first pins K1, and the second pins K2 after encrypting is sent to terminating machine P1.
Step 210: after terminating machine P1 receives the second pins K2 after the encryption that sends from control station 34, just can be decrypted it with the first pins K1, obtaining the second real pins K2, and terminating machine P1 can upgrade the first pins K1 with the second pins K2 simultaneously.
Step 220: for determine terminating machine P1 successful be updated to the first pins K1 with the second pins K2, control station 34 can transmit one and confirm to interrogate data to terminating machine P1, this confirms to interrogate data and does not encrypt with the first pins K1 or the second pins K2.
Step 230: terminating machine P1 receives after the affirmation that sends from control station 34 interrogates data, and just can will confirm to interrogate data encryption with the second pins K2 is one to respond and confirm data, then this is responded affirmation data and is sent to control station 34.
Step 240: control station 34 also can be encrypted as a standard with the second pins K2 and respond the affirmation data, after data are confirmed in the response that control station 34 receptions send from terminating machine P1, control station 34 just can relatively be responded and confirm data and standard response affirmation data, if responding, the response data conformance with standard confirms data, represent so terminating machine P1 successful the first pins K1 is updated to the second pins K2, so the transfer of data between following control station 34 and the terminating machine P1 just can be encrypted and decipher with the second pins K2, carry out step 250; If response data not conformance with standard is responded the affirmation data, represent that so terminating machine P1 is not updated to the second pins K2 to the first pins K1, therefore must carry out the more new element of pins from step 110 beginning again.
Step 250: finish the action that the first pins K1 is updated to the second pins K2, and wait for that timing module 36 touches random code generating routine 38 next time, so that random code generating routine 38 produces the 3rd pins K3, then just repeat above step, so that the second pins K2 is updated to the 3rd pins K3, so constantly upgrade the common pins in the Radio Network System 30 always, make the pins in the Radio Network System 30 and the data transmitted all can be carried out suitable maintaining secrecy.
Timing module 36 among the above embodiment is arranged in the server 32, random code generating routine 38 then is stored in the control station 34, yet the present invention is not limited to this, timing module 36 among the present invention also can be arranged in the control station 34, and random code generating routine 38 also can be stored in the server 32 certainly, as long as when timing module 36 meets a scheduled time, can touch random code generating routine 38 and produce a new pins, all belong to the scope that the present invention is contained.In addition, this scheduled time can be a regular time, also can be the revocable time, be that Radio Network System 30 can upgrade its interior pins according to a regular time, or upgrade pins in it according at random time, but, can reach the purpose that the present invention dynamically updates the pins of Radio Network System 30 equally no matter be that is a kind of.
Include a memory 40 in the control station 34 in addition, be used for storing up-to-date pins and the pins of being had been friends in the past, the up-to-date pins of supposing present Radio Network System 30 is the 3rd pins K3, memory 40 can be stored the 3rd pins K3 and the second pins K2 and the first pins K1 so, so can avoid when Radio Network System 30 when upgrading pins, terminating machine P1 is because some reason (for example terminating machine P1 is shut down) and renewal pins that can't be synchronous with control station 34 causes being withdrawed from Radio Network System 30.For example when random code generating routine 38 produces the 3rd pins K3, terminating machine P1 is owing to being shut down or other factors make it the first pins K1 is not updated to the second pins K2, at this time owing to still store the second pins K2 in the control station 34, so terminating machine P1 just still can change to the second pins K2 with the first pins K1, change to the 3rd pins K3 again, or directly the first pins K1 is changed to the 3rd pins, do not withdrawed from Radio Network System 30 to avoid because store the second pins K2 in the terminating machine P1.
Pins update method compared to known wireless network system 10, the pins update method of Radio Network System 30 of the present invention is when timing module 36 meets a scheduled time, random code generating routine 38 just can produce a new pins, and the control station 34 in the Radio Network System 30 and each terminating machine P1, P2 and the stored old pins of P3 are updated to new pins.So can save by the staff and be updated to new pins institute's time spent and manpower with manual mode pins one by one old, and owing to pins is produced by the random code generating routine, staff and terminating machine user also do not know the content of new pins, therefore can make real being maintained secrecy of pins.In addition, because Radio Network System 30 can be at random or changed pins continually, therefore can avoid network hacker's invasion.So the user utilizes the pins update method of Radio Network System 30 of the present invention not only can enjoy the convenience of wirelessly transmitting data, more can make real being maintained secrecy of data of transmission.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to the present patent application claim change and modify, and all should belong to the covering scope of patent of the present invention.

Claims (8)

1. the method for an automatic ally updating network system pins, this network system includes:
One server;
One control station is connected in this server, is used for the data that this server transmits are sent wirelessly, or receives wireless data and data are sent to this server; Wherein this control station is encrypted the data that will transfer to this terminating machine with first pins;
One terminating machine is used for receiving the data that this control station transmits with wireless mode, and with wireless mode data is sent to this control station; Store this first pins in this terminating machine, be used for encrypting the data that will transfer to this control station; And
One timing module is installed in this server, this control station or this terminating machine, is used for writing time;
This terminating machine has a recognition data in addition, and stores a pair of logon data that should recognition data in this server in addition;
This method includes:
Trigger this timing module opening entry time;
When the time of this timing module record meets a ticket reserving time, produce second pins at random mode;
This control station is interrogated data with one and is transferred to this terminating machine wirelessly;
It is a response data that first pins in this terminating machine should be interrogated data encryption, and this response data is transferred to this control station wirelessly;
This control station is compared this response data and a standard response data;
If this response data meets this standard response data, then this terminating machine transfers to this control station wirelessly with the recognition data of this terminating machine;
This control station transfers to this server with this recognition data;
If the recognition data of this terminating machine meets the logon data of this server, then this control station can transfer to this terminating machine with this second pins, is updated to this second pins with first pins that will store in this terminating machine; And
This second pins is encrypted the data of transmitting mutually between this control station and this terminating machine.
2. the method for claim 1 is characterized in that, this standard response data is to be encrypted and get with this first pins by these interrogation data.
3. the method for claim 1 is characterized in that, other includes: before first pins with this terminating machine is updated to this second pins, and the agreement of inquiring this terminating machine user.
4. the method for claim 1 is characterized in that, after this terminating machine was updated to this second pins with this first pins, this terminating machine was the data decryption that this control station is transmitted with this second pins.
5. the method for claim 1 is characterized in that, this network system has a plurality of terminating machines, and each terminating machine all stores this first pins, and each terminating machine stores its corresponding recognition data respectively.
6. the method for claim 1 is characterized in that, this second pins is to produce at random with a random code generating routine.
7. the method for claim 1 is characterized in that, other includes:
After this second pins is transferred to this terminating machine, confirm to interrogate data with this control station with one and transfer to this terminating machine wirelessly;
Should confirm to interrogate data encryption with second pins in this terminating machine is that data are confirmed in a response, and should respond and confirm that data transfer to this control station wirelessly;
Compare this response with this control station and confirm data and standard response affirmation data.
8. the method for claim 1 is characterized in that, this timing module be one actual time timer, be used for writing down actual time.
CN021193312A 2002-05-08 2002-05-08 Method for automatic ally updating network system pins Expired - Fee Related CN100407616C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN021193312A CN100407616C (en) 2002-05-08 2002-05-08 Method for automatic ally updating network system pins

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN021193312A CN100407616C (en) 2002-05-08 2002-05-08 Method for automatic ally updating network system pins

Publications (2)

Publication Number Publication Date
CN1457168A CN1457168A (en) 2003-11-19
CN100407616C true CN100407616C (en) 2008-07-30

Family

ID=29410410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN021193312A Expired - Fee Related CN100407616C (en) 2002-05-08 2002-05-08 Method for automatic ally updating network system pins

Country Status (1)

Country Link
CN (1) CN100407616C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100433161C (en) * 2005-02-05 2008-11-12 北京凯诚高清电子技术有限公司 Digital content intelligent playing device and its controllable playing method
US20070124807A1 (en) * 2005-11-29 2007-05-31 Taiwan Semiconductor Manufacturing Co., Ltd. Password update systems and methods
CN102110003A (en) * 2009-12-29 2011-06-29 宏碁股份有限公司 Automatic update inspection system and automatic update inspection method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1237843A (en) * 1998-06-02 1999-12-08 日本电气株式会社 System, method, and medium for broadcasting service contents

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1237843A (en) * 1998-06-02 1999-12-08 日本电气株式会社 System, method, and medium for broadcasting service contents

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CN123784.A 1999.12.08

Also Published As

Publication number Publication date
CN1457168A (en) 2003-11-19

Similar Documents

Publication Publication Date Title
US7287693B2 (en) Proximity validation system and method
US8793784B2 (en) Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
CN106504391B (en) Control method, device and system of intelligent access control
US9258281B2 (en) Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
CN101589400B (en) Right management method, its system, server device used in the system, and information device terminal
JP5090066B2 (en) Data storage device, management server, integrated circuit, data update system, home appliance, data update method, encryption method, and encryption / decryption key generation method
CN100590639C (en) System and method for managing multiple smart card sessions
CN103875006A (en) Radio frequency identification technology incorporating cryptographics
CN101667240A (en) Intelligent card and card writing method, equipment and system thereof
US20170230365A1 (en) Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device
CN108605034A (en) Radio firmware updates
KR20100071209A (en) Verification of device using device tag
US20030221098A1 (en) Method for automatically updating a network ciphering key
CN104365127A (en) Method for tracking a mobile device onto a remote displaying unit
CN103324971B (en) A kind of smart card system and dynamic key thereof upgrade authentication method
CN112564901B (en) Method and system for generating secret key, storage medium and electronic device
KR20190040443A (en) Apparatus and method for creating secure session of smart meter
CN100407616C (en) Method for automatic ally updating network system pins
EP3358515A1 (en) Method for cryptographically signing a transaction
JP7139621B2 (en) Electronic information storage medium, communication program, and communication device
CN100583743C (en) Distributing method for transmission key
JP2005175879A (en) Authentication system, authentication device, and managing device
CN103324970A (en) Efficient and safe RFID (radio frequency identification device) receiving and transmitting method and system
KR101395315B1 (en) Near field communication based payment security authentication system and security authentication method thereof
KR101006803B1 (en) RFID Authentication Apparatus for comprising Authentication Function and Method thereof

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080730

Termination date: 20190508